Vulnerabilities

New infosec products of the week: July 23, 2021

Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks Stellar Cyber introduced a...

Kaseya Gets Universal Decryptor to Help REvil Ransomware Victims

Nearly three weeks after Florida-based software vendor Kaseya was hit by a widespread supply-chain ransomware attack, the company on Thursday said it obtained...

Kaseya obtains REvil decryptor, starts sharing it with afflicted customers • The Register

Software-for-services providers business Kaseya has obtained a "universal decryptor key" for the REvil ransomware and is delivering it to clients. A brief Thursday update...

Cyber-attacks really ramp up after Halloween – so why not start preparing now? • The Register

Promo Whisper it softly, but we’re fast forwarding through the second half of 2021, which means the holiday shopping season – and accompanying...

Cloud Security

Acronis gets deeper into the Apple enterprise with Addigy partnership

The burgeoning enterprise Apple space saw thousands of IT admins virtually attend this week’s JNUC event, and the week tails off with news...

October 2021 Release in Review

NEW! Vulnerability Identification Labs This week at Security Innovation, we are excited to release our first-ever series of vulnerability identification labs. Each lab is...

Making Sure the Lights Don’t Go Out

By Brett Raybould, EMEA Solutions Architect at Menlo Security The ransomware attack on Colonial Pipeline, the largest fuel pipeline in the US has shown...

Industry Shorts

The Rise of the DevZombies

When it comes to software development, the cat’s out of the bag – failing to implement key security activities throughout has earned insecure...

PC Building Simulator Is Free On the Epic Games Store

PC Building Simulator is currently free on the Epic Games Store until October 17th. The Verge reports: Like the majority of...

3 Steps To Prevent Cyberthreats & Secure Your Company’s Data

While data security has been an important topic since the internet’s inception, the issue is experiencing renewed prominence as platforms collect and struggle...

LATEST ARTICLES

‘Critical Severity’ Warning for Malware Embedded in Popular JavaScript Library

Security responders are scrambling this weekend to assess the damage from crypto-mining malware embedded in an npm package (JavaScript library) that counts close...

Popular NPM Package Hijacked to Publish Crypto-mining Malware

The U.S. Cybersecurity and Infrastructure Security Agency on Friday warned of crypto-mining malware embedded in "UAParser.js," a popular JavaScript NPM library with over...

Cisco Talos Intelligence Group – Comprehensive Threat Intelligence: Threat Roundup for October 15 to October 22

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 15 and Oct. 22. As with previous roundups, this post...

Microsoft Introduces Security Program for Non-Profits

Tech giant Microsoft has rolled out new security offering to provide non-profit organizationss with additional security in the event of a nation-state attack. Microsoft...

Acronis gets deeper into the Apple enterprise with Addigy partnership

The burgeoning enterprise Apple space saw thousands of IT admins virtually attend this week’s JNUC event, and the week tails off with news...

CIS CSAT Pro v1.7: CIS Controls v8 Assessment and More

The CIS Controls Self Assessment Tool (CIS CSAT) allows organizations to perform assessments on their implementation of the CIS Critical Security Controls (CIS...

‘Lone Wolf’ Hacker Group Targeting Afghanistan and India with Commodity RATs

A new malware campaign targeting Afghanistan and India is exploiting a now-patched, 20-year-old flaw affecting Microsoft Office to deploy an array of commodity...

REvil ransomware gang allegedly forced offline by law enforcement counterattacks – Naked Security

According to Reuters, the REVil ransomware operation was “hacked and forced offline this week by a multi-country operation”. Reuters writes that one of its...

Privacy

What is Cookie Piggybacking? | Cookie Syncing, Tag Piggybacking

Cookie piggybacking, also referred to as cookie syncing and piggybacking tags is a term used to describe a common web development practice that...

Understanding the New CCPA/CPRA Amendments in AB 694

On October 5th, California Governor Gavin Newsom signed Assembly Bill 694 (AB 694), an omnibus bill from the Committee on Privacy and Consumer...

Saudi Arabia’s New Data Protection Law – What you need to know – Privacy Matters

The Middle East’s data protection regulatory landscape is complex, and continues to develop with Saudi Arabia’s (KSA) newly published Personal Data Protection Law...

France’s CNIL Issues Update on Cookie Compliance Enforcement Actions

Back in July, France’s Data Protection Authority (DPA), the CNIL, issued formal notices to forty organizations it said had failed to follow the...

Types of Consent Banners | GDPR, CCPA Compliant Consent Banner

Legal definitions of consent vary by law and jurisdiction. But in the context of data privacy and data rights, similarities emerge across legal...

WhatsApp Hit with $267M Fine For GDPR Noncompliance

EU Data Protection Authorities (DPAs) continue to step up enforcement of its omnibus privacy regulation, the General Data Protection Regulation (GDPR). In July,...

IOT Security

Security Recruiter Directory | CSO Online

CISORecruiter About: We are a retained, permanent placement executive search firm out of Miami Beach, FL, that is focused on placing IT security leadership...

Decline in ransomware claims could spark change for cyber insurance

New data highlighting fluctuations relating to ransomware attack and payment claims indicates significant shifts in the cyberthreat landscape. Could such variations trigger changes...

Why NDR? See the Entire Elephant in the Room

By Aimei Wei, Chief Technical Officer (CTO) and Founder Network detection and response (NDR) has a long history, evolving out of network security and...

Tech and Gadgets

Technology

AdTech startup Tomi raises Seed funding to make real estate ads perform as well as ecommerce – TechCrunch

Industries like real estate, automotive, and financial services have long and offline sales cycles and digital advertising tends not to perform well in...

$100 million… Leta Capital wants to be a friend to Russia-speaking founders everywhere – TechCrunch

It’s become increasingly obvious over the last few years, as Vladimir Putin has tightened his grip on his country, that Russian entrepreneurs who...

Acryl Data, commercializing LinkedIn’s metadata tool DataHub, emerges from stealth with $9M from 8VC, LinkedIn and Insight – TechCrunch

In 2019, LinkedIn’s engineering team announced DataHub, a metadata tool it had built to help it organise, search and discover insights from its...

Malware

‘Critical Severity’ Warning for Malware Embedded in Popular JavaScript Library

Security responders are scrambling this weekend to assess the damage from crypto-mining malware embedded in an npm package (JavaScript library) that counts close...

Popular NPM Package Hijacked to Publish Crypto-mining Malware

The U.S. Cybersecurity and Infrastructure Security Agency on Friday warned of crypto-mining malware embedded in "UAParser.js," a popular JavaScript NPM library with over...

Microsoft Introduces Security Program for Non-Profits

Tech giant Microsoft has rolled out new security offering to provide non-profit organizationss with additional security in the event of a nation-state attack. Microsoft...

Privacy Shorts

New SCCs published – Privacy Matters

Today, the European Commission published the final Implementing Decision on standard contractual clauses (“New SCCs”) for the transfer of personal data to third countries.  The...

Everything You Need to Know About the Colorado Privacy Act (CPA)

On July 7, 2021, Colorado Governor Jared Polis signed The Colorado Privacy Act (SB 190) into law, just a month after the bill...

The Italian DPA has Released New Guidance on Cookie Compliance

Italy's data protection authority (DPA), the Garante, has announced its finalized guidelines on cookies and tracking technologies. The Garante’s guidelines, first released as...

Most Popular

4 ways ransomware can cost your business (in addition to extortion)

Cybersecurity analysts are charting both a rise in ransomware incidents and in amounts cybercriminals are demanding from businesses to restore their data. That’s...

US Accuses China of Using Criminal Hackers in Cyber …

DOJ indicts four Chinese individuals for alleged role in attacks targeting intellectual property, trade secrets belonging to defense contractors, maritime companies, aircraft service...

The Importance of Cybersecurity for Students and Children in Today’s World

Due to cloud services and global connectivity, cybercrimes are increasing with every passage of time. Web services have contributed a lot in spreading...

Cyber-attacks really ramp up after Halloween – so why not start preparing now? • The Register

Promo Whisper it softly, but we’re fast forwarding through the second half of 2021, which means the holiday shopping season – and accompanying...

Recent Comments